Composite Security Boundary Visualization
نویسندگان
چکیده
| Based on a recently developed security assessment methodology using automatic training data generation software and neural networks, a composite security boundary visualization approach is proposed for power system operations. This approach can draw a single continuous boundary given multiple individual security problems. It can be conveniently accessed on-line and can be easily integrated into the energy management system (EMS). Examples are given for demonstration of the eeectiveness of the proposed approach.
منابع مشابه
Genetic-based Feature Selection Applied to Neural Networks for Security Boundary Visualization
Knowledge of security boundaries is becoming more and more important as transmission lines are operating closer and closer to their capacities in today's deregulated environment. On-line visualization of security boundaries using intelligent techniques provides an eeective methodology for this problem. Feature selection , i.e., critical parameter selection, is one of the most essential techniqu...
متن کاملOn-Line Visualization of Security Boundaries Using Neural Networks with Feature Selection
| Knowledge of security boundaries in terms of easily monitorable operating parameters is becoming more and more important as power systems are operating close to their capabilities in today's deregulated environment. On-line visualization of security boundaries using intelligent techniques provides an eeective methodology for this problem. This paper presents further development on this method...
متن کاملFree and Forced Vibration Analysis of Composite Laminated Conical Shells under Different Boundary Conditions Via Galerkin Method
In this paper, natural frequency and response of forced vibration of composite laminated conical shells under different boundary conditions are investigated. To this end, equations of Donnell's thin shell theory are used as governing equations. The analytical Galerkin method together with beam mode shapes as weighting functions is employed to solve the problem. Due to importance of boundary con...
متن کاملPerformance Evaluation of Composite Network Security Situation Assessment Using HRCAL Approach
Internet attacks area unit on the increase and create serious security threats to enterprise networks, industrial websites and to the lots of home web users. Web attacks have become less assailable and complicated with time. Network traffic visualization tools have with successfully enabled security analysts to know the character of traffic gift in a very network. Conversely, these tools believ...
متن کاملA PMU-Based Method for Smart Transmission Grid Voltage Security Visualization and Monitoring
With the rapid growth of usage of phasor measurement units (PMUs) for modern power grids, the application of synchronized phasors (synchrophasors) to real-time voltage security monitoring has become an active research area. This paper presents a novel approach for fast determination of loading margin using PMU data from a wide-area monitoring system (WAMS) to construct the voltage stability bou...
متن کامل